Thecus i8500 iSCSI RAID SYSTEM User Manual -1-
Preface About this manual This manual is the introduction of i8500 and it aims to help users know the operations of the disk array system easily. Information contained in this manual has been reviewed for accuracy, but not for product warranty because of the various environments/OS/settings, Information and specification will be changed without further notice. For any update information, please visit www.thecus.com and your contact windows. Copyright@2009, Thecus Technology, Corp. All rights reserved.
Table of Contents 1.1 1.2 1.3 1.4 Features........................................................................... 5 Terminology ..................................................................... 6 RAID levels ...................................................................... 8 Volume relationship diagram ........................................... 9 Chapter 2 2.1 2.2 2.3 Before starting................................................................ 10 iSCSI introduction ......................
3.8.1 3.8.2 3.8.3 3.8.4 3.8.5 3.8.6 3.9 System information............................................................................... 54 Upgrade................................................................................................ 54 Reset to factory default......................................................................... 55 Import and export ................................................................................. 56 Event log ................................................
Chapter 1 RAID introduction 1.1 Features i8500 controller features: • • • • • • • • • Front-end 2 GbE NIC ports. iSCSI jumbo frame support. RAID 6, 60 ready. SATA II drives backward-compatible. One logic volume can be shared by as many as 8 hosts and 32 connections per system. Host access control. Configurable N-way mirror for high data protection. On-line volume migration with no system down-time. HDD S.M.A.R.T. enabled for SATA drives.
Caution Snapshot / rollback features need 512MB RAM or more. Please refer to RAM certification list in Appendix A for more detail. 1.2 Terminology The document uses the following terms: RAID RAID is the abbreviation of “Redundant Array of Independent Disks”. There are different RAID levels with different degree of the data protection, data availability, and performance to host environment. PD The Physical Disk belongs to the member disk of one specific RAID group. RG Raid Group.
RAID width=1; RAID copy=4; RAID row=3. WT Write-Through cache-write policy. A caching technique in which the completion of a write request is not signaled until data is safely stored in non-volatile media. Each data is synchronized in both data cache and accessed physical disks. WB Write-Back cache-write policy. A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time.
WWN World Wide Name. HBA Host Bus Adapter. SAF-TE SCSI Accessed Fault-Tolerant Enclosures. SES SCSI Enclosure Services. NIC Network Interface Card. LACP Link Aggregation Control Protocol. MPIO Multi-Path Input/Output. MC/S Multiple Connections per Session MTU Maximum Transmission Unit. CHAP Challenge Handshake Authentication Protocol. An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. 1.
RAID 0+1 Mirroring of the member RAID 0 volumes. RAID 0+1 needs at least four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives. RAID 30 Striping over the member RAID 3 volumes. RAID 30 needs at least six hard drives. RAID 50 Striping over the member RAID 5 volumes. RAID 50 needs at least six hard drives. RAID 60 Striping over the member RAID 6 volumes. RAID 60 needs at least eight hard drives. JBOD The abbreviation of “Just a Bunch Of Disks”.
execute the data transaction. Each CV can have different cache memory size by user’s modification/setting. LUN (Logical Unit Number) is a unique identifier, in which users can access through SCSI commands. Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. 1. 2. 3. 4. 5. 6. 7. 8. 9. Check “Certification list” in Appendix A to confirm the hardware setting is fully supported. Read the latest release note before upgrading. Release note accompany with release firmware.
Storage protocol, such as iSCSI, has “two ends” in the connection. These ends are initiator and target. In iSCSI, we call them iSCSI initiator and iSCSI target. The iSCSI initiator requests or initiates any iSCSI communication. It requests all SCSI operations like read or write. An initiator is usually located on the host/server side (either an iSCSI HBA or iSCSI SW initiator). The target is the storage device itself or an appliance which controls and serves volumes or virtual volumes.
2. Linux iSCSI initiator is also available. For different kernels, there are different iSCSI drivers. Please check Appendix A for iSCSI initiator certification list. If user needs the latest Linux iSCSI initiator, please visit Open-iSCSI project for most update information. Linux-iSCSI (sfnet) and Open-iSCSI projects merged in April 11, 2005. Open-iSCSI website: http://www.open-iscsi.org/ Open-iSCSI README: http://www.open-iscsi.org/docs/README Features: http://www.open-iscsi.org/cgi-bin/wiki.
Or login with read-only account which only allows reading the configuration and cannot change setting. Login name: user Default password: 1234 2.3.2 Remote control – secure shell SSH (secure shell) is required for controllers to remote login. The SSH client software is available at the following web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.greenend.org.uk/ Host name: 192.168.1.100 (Please check your DHCP address for this field.
When there is WARNING or ERROR occurred (LCM default filter), the LCM shows the event log to give users more detail from front panel. The following table is function description. System Info. Display system information. Alarm Mute Mute alarm when error occurs. Reset/Shutdown Reset or shutdown controller. Quick Install Quick steps to create a volume. Please refer to next chapter for operation in web UI. Volume Wizard Smart steps to create a volume.
[Quick Install] [Volume Wizard] [View IP Setting] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 xxx GB [Local] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [JBOD x] cd RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [IP Config] [Static IP] [IP Address] [192.168.001.100] [IP Subnet Mask] [255.255.255.0] [IP Gateway] [192.168.001.
2.4.2 System buzzer The system buzzer features are listed below: 1. 2. 3. 2.4.3 The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error occurred. The alarm will be stopped after error resolved or be muted. The alarm will be muted automatically when the error is resolved. E.g., when RAID 5 is degraded and alarm rings immediately, user changes/adds one physical disk for rebuilding.
Chapter 3 Web GUI guideline 3.1 Web GUI hierarchy The below table is the hierarchy of web GUI.
Upgrade Reset to default Import and export Event log Reboot and shutdown Logout Æ Browse the firmware to upgrade / Export configuration Æ Sure to reset to factory default? Æ Import/Export / Import file Æ Download / Mute / Clear Æ Reboot / Shutdown Sure to logout? 3.2 Login i8500 supports graphic user interface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP address is 192.168.1.100; open the browser and enter: http://192.168.1.100 (Please check the IP address first on LCM.
Figure 3.2.2 1. RAID light: Green means RAID works well. Red represents RAID failure. 2. Temperature light: Green means normal temperature. Red represents abnormal temperature. 3. Voltage light: Green means normal voltage. Red represents abnormal voltage. 4. UPS light: Green means UPS works well. Red represents UPS failure. 3.3 Volume creation wizard It is easy to use “Volume creation wizard” to create a volume.
Step 2: Confirm page. Click “ a VD will be created. ” if all setups are correct. Then Done. You can start to use the system now. Figure 3.3.2 (Figure 3.3.2: A RAID 0 Virtual disk with the VD name “QUICK53360”, named by system itself, with the total available volume size 1191GB.) 3.4 System configuration “System configuration” is designed for setting up the “System setting”, “IP address”, “Login setting”, “Mail setting”, and “Notification setting”. Figure 3.4.1 3.4.
Figure 3.4.1.1 Check “Change date and time” to set up the current date, time, and time zone before using or synchronize time from NTP (Network Time Protocol) server. 3.4.2 IP address “IP address” can change IP address for remote administration usage. There are 2 options, DHCP (Get IP address from DHCP server) or static IP. The default setting is Static IP(192.168.1.100). User can change the HTTP, and SSH port number when the default port number is not allowed on host/server. Figure 3.4.2.
3.4.3 Login setting “Login setting” can set single admin, auto logout time and Admin/User password. The single admin can prevent multiple users access the same controller at the same time. 1. 2. Auto logout: The options are (1) Disable; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system will log out automatically when user is inactive for a period of time. Login lock: Disable/Enable. When the login lock is enabled, the system allows only one user to login or modify system settings. Figure 3.4.3.
Figure 3.4.4.1 3.4.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messenger (not MSN), alert via system log server protocol, and event log filter.
Figure 3.4.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and default setting only enables INFO event log in SNMP. There are many SNMP tools. The following web sites are for your reference: SNMPc: http://www.snmpc.com/ Net-SNMP: http://net-snmp.sourceforge.
Using “System log server”, user can choose the facility and the event log level. The default port of syslog is 514. The default setting enables event level: INFO, WARNING and ERROR event logs. There are some syslog server tools. The following web sites are for your reference: WinSyslog: http://www.winsyslog.com/ Kiwi Syslog Daemon: http://www.kiwisyslog.com/ Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event level on “Pop up events” and “LCM”. 3.
3.5.2 NIC “NIC” can change IP addresses of iSCSI data ports. Figure 3.5.2.1 (Figure 3.5.2.1: there are 2 iSCSI data ports.) IP settings: User can change IP address by moving mouse to the gray button of LAN port, click “IP settings for iSCSI ports”. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. Figure 3.5.2.2 Default gateway: Default gateway can be changed by moving mouse to the gray button of LAN port, click “Become default gateway”. There is only one default gateway.
Caution The MTU size of switching hub and HBA on host must be enabled. Otherwise, the LAN connection can not work properly. 3.5.3 Node “Node” can view the target name for iSCSI initiator. The node name of i8500 exists by default and can not be changed. Figure 3.5.3.1 CHAP: CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP is a strong authentication method used in point-to-point for user login.
4. 5. Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. In “Authenticate” page, select “None” to disable CHAP. Tips After setting CHAP, the initiator in host/server should be set the same CHAP account. Otherwise, user cannot login. 3.5.4 Session “Session” can display iSCSI session and connection information, including the following items: 1. 2. 3. 4.
2. Enter “User”, “Secret”, and “Confirm” secret again. Figure 3.5.5.3 3. Click “ ”. Figure 3.5.5.1 (Figure 3.5.5.4: create a CHAP account named “chap1”.) 4. Click “Delete” to delete CHAP account. 3.6 Volume configuration “Volume configuration” is designed for setting up the volume configuration which includes “Volume create wizard”, “Physical disk”, “RAID group”, “Virtual disk”, “Snapshot”, and “Logical unit”. Figure 3.6.1 3.6.1 Volume create wizard “Volume create wizard” has a smarter policy.
RAID levels, it will use all available HDDs for RAID level depends on which user chooses. When system has different sizes of HDDs, e.g., 8*200G and 8*80G, it lists all possibilities and combination in different RAID level and different sizes. After user chooses RAID level, user may find that some HDDs are available (free status). The result is using smarter policy designed by Thecus. It gives user: 1. 2.
Figure 3.6.1.2 Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “ ”. Figure 3.6.1.3 Step 4: Confirm page. Click “ a VD will be created. ” if all setups are correct. Then Done. You can start to use the system now. Figure 3.6.1.4 (Figure 3.6.1.4: A RAID 0 Virtual disk with the VD name “QUICK13573”, named by system itself, with the total available volume size 1862GB.
3.6.2 Physical disk “Physical disk” can view the status of hard drives in the system. The followings are operational tips: 1. 2. Mouse moves to the gray button next to the number of slot, it will show the functions which can be executed. Active function can be selected, but inactive function will show in gray color. For example, set PD slot number 11 to dedicated spare disk. Step 1: Mouse moves to the gray button of PD 11, select “Set Dedicated spare”, it will link to next page. Figure 3.6.2.
Figure 3.6.2.3 (Figure 3.6.2.3: Physical disks of slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of RG named “RG-R5”. The others are free disks.) • PD column description: Slot The position of hard drives. The button next to the number of slot shows the functions which can be executed. Size (GB) Capacity of hard drive. RG Name Related RAID group name. Status The status of hard drive. “Online” Æ the hard drive is online.
“Good” Æ the hard drive is good. “Failed” Æ the hard drive is failed. “Error Alert” Æ S.M.A.R.T. error alert. “Read Errors” Æ the hard drive has unrecoverable read errors. Usage “RD” Æ RAID Disk. This hard drive has been set to RAID. “FR” Æ FRee disk. This hard drive is free for use. “DS” Æ Dedicated Spare. This hard drive has been set to the dedicated spare of the RG. “GS” Æ Global Spare. This hard drive has been set to a global spare of all RGs. “RS” Æ ReServe.
Set Dedicated spares Set hard drive to dedicated spare of selected RGs. Set property Change the status of write cache and standby. Write cache options: “Enabled” Æ Enable disk write cache. “Disabled” Æ Disable disk write cache. Standby options: “Disabled” Æ Disable spindown. “30 sec / 1 min / 5 min / 30 min” Æ Enable hard drive auto spindown to save power in the period of time. More information 3.6.3 Show hard drive detail information. RAID group “RAID group” can view the status of each RAID group.
Step 2: Confirm page. Click “ ” if all setups are correct. Figure 3.6.3.2 (Figure 3.6.3.2: There is a RAID 0 with 4 physical disks, named “RG-R0”, total size is 135GB. Another is a RAID 5 with 3 physical disks, named “RG-R5”.) Done. View “RAID group” page. • RG column description: No. Number of RAID group. The button next to the No. shows the functions which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group.
“Migrate” Æ the RAID group is being migrated. “Scrub” Æ the RAID group is being scrubbed. Health The health of RAID group. “Good” Æ the RAID group is good. “Failed” Æ the hard drive is failed. “Degraded” Æ the RAID group is not completed. The reason could be lack of one disk or disk failure. • RAID The RAID level of the RAID group. Enclosure RG locates on local or JBOD enclosure. RG operations description: Create Create a RAID group. Migrate Migrate a RAID group.
information 3.6.4 Virtual disk “Virtual disk” can view the status of each Virtual disk. The following is an example to create a VD. Step 1: Click “ ”, enter “Name”, choose “RG name”, “Stripe height (KB)”, “Block size (B)”, “Read/Write” mode, “Priority”, “Bg rate” , change “Capacity (GB)” if necessary. Then click “ ”. Figure 3.6.4.1 Step 2: Confirm page. Click “ ” if all setups are correct.
Figure 3.6.4.2 (Figure 3.6.4.2: Create a VD named “VD-01”, related to “RG-R0”, size is 30GB. The other VD is named “VD-02”, initializing to 12%.) Done. View “Virtual disk” page. • VD column description: No. Number of this Virtual disk. The button next to the VD No. shows the functions which can be executed. Name Virtual disk name. Size(GB) Total capacity of the Virtual disk. Right “WT” Æ Write Through. “WB” Æ Write Back. “RO” Æ Read Only. Priority “HI” Æ HIgh priority. “MD” Æ MiD priority.
Bg rate Background task priority. “4 / 3 / 2 / 1 / 0” Æ Default value is 4. The higher number the background priority of a VD has, the more background I/O will be scheduled to execute. Status The status of Virtual disk. “Online” Æ the Virtual disk is online. “Offline” Æ the Virtual disk is offline. “Initiating” Æ the Virtual disk is being initialized. “Rebuild” Æ the Virtual disk is being rebuilt. “Migrate” Æ the Virtual disk is being migrated. “Rollback” Æ the Virtual disk is being rolled back.
• #Snapshot Number of snapshot(s) that Virtual disk is taken. RG name The Virtual disk is related to the RG name Readahead This feature makes data be loaded to disk's buffer in advance for further use. Default is "Enabled". VD operations description: Extend Extend a Virtual disk capacity. Scrub Scrub a Virtual disk. It’s a parity regeneration. It supports RAID 3 / 5 / 6 / 30 / 50 / 60 only. Delete Delete a Virtual disk. Set property Change the VD name, right, priority and bg rate.
3.6.5 Cleanup snapshot Clean all snapshot VD related to the Virtual disk and release snapshot space. Take snapshot Take a snapshot on the Virtual disk. Auto snapshot Set auto snapshot on the Virtual disk. List snapshot List all snapshot VD related to the Virtual disk. More information Show Virtual disk detail information. Snapshot “Snapshot” can view the status of snapshot. Please refer to next chapter for more detail about snapshot concept. The following is an example to take a snapshot.
Step 3: Take a snapshot. In “/ Volume configuration / Snapshot”, click “ ”. It will link to next page. Enter a snapshot name. Figure 3.6.5.3 Step 4: Export the snapshot VD. Mouse moves to the gray button next to the Snapshot VD number; click “Export”. Enter a capacity for snapshot VD. If size is zero, the exported snapshot VD will be read only. Otherwise, the exported snapshot VD can be read/written, and the size will be the maximum capacity to read/write. Figure 3.6.5.4 Figure 3.6.5.5 (Figure 3.6.5.
• Snapshot column description: No. Number of this snapshot VD. The button next to the snapshot VD No. shows the functions which can be executed. Name Snapshot VD name. Used (MB) The amount of snapshot space that has been used. Exported Snapshot VD is exported or not. Right “RW” Æ Read / Write. The snapshot VD can be read / write. “RO” Æ Read Only. The snapshot VD can be read only. • 3.6.6 #LUN Number of LUN(s) that snapshot VD is attaching. Created time Snapshot VD created time.
User can attach LUN by clicking the “ ”. “Host” must enter an iSCSI node name for access control, or fill-in wildcard “*”, which means every host can access the volume. Choose LUN number and permission, then click “ ”. Figure 3.6.6.1 • LUN operations description: Attach Attach a logical unit number to a Virtual disk. Detach Detach a logical unit number from a Virtual disk. The matching rules of access control are inspected from top to bottom in sequence.
Step 1: Create RG (RAID group). To create the RAID group, please follow the procedures: Figure 3.6.7.1 1. 2. 3. 4. 5. Select “/ Volume configuration / RAID group”. “. Click “ Input a RG Name, choose a RAID level from the list, click “ “ to choose the RAID PD slot(s), then click “ “. Check the outcome. Click “ “ if all setups are correct. Done. A RG has been created. Figure 3.6.7.2 (Figure 3.6.7.2: Creating a RAID 5 with 3 physical disks, named “RG-R5”. The total size is 931GB.
Figure 3.6.7.3 5. 6. 7. 8. 9. Select “/ Volume configuration / Virtual disk”. ”. Click “ Input a VD name, choose a RG Name and enter a size of VD; decide the stripe high, block size, read/write mode and set priority, finally click “ “. Done. A VD has been created. Do one more time to create another VD. Figure 3.6.7.4 (Figure 3.6.7.4: Create VDs named “VD-R5-1” and “VD-R5-2”. Regarding to “RG-R5”, the size of “VD-R5-1” is 50GB, the size of “VD-R5-2” is 64GB. “VD-R5-1” is initialing about 86%.
2. 3. Input “Host” name, which is a FC node name for access control, or fillin wildcard “*”, which means every host can access to this volume. Choose LUN and permission, then click “ ”. Done. Tips The matching rules of access control are from top to bottom in sequence. Step 4: Set global spare disk. To set global spare disks, please follow the procedures. 1. 2. 3. Select “/ Volume configuration / Physical disk”. Mouse moves to the gray button next to the PD slot; click “Set Global space”.
In “/ Volume configuration / Logical unit”, 1. 2. 3. Mouse moves to the gray button next to the LUN; click “Detach”. There will pop up a confirmation page. Choose “OK”. Done. Step 7: Delete VD (Virtual disk). To delete the Virtual disk, please follow the procedures: 1. 2. 3. Select “/ Volume configuration / Virtual disk”. Mouse moves to the gray button next to the VD number; click “Delete”. There will pop up a confirmation page, click “OK”. Done. Then, the VDs are deleted.
1. 2. Select “/ Volume configuration / Physical disk”. Mouse moves to the gray button next to the PD slot; click “Set Free disk”. Step 10: Done, all volumes have been deleted. 3.7 Enclosure management “Enclosure management” allows managing enclosure information including “SES configuration”, “Hardware monitor”, “S.M.A.R.T.” and “UPS”.
3.7.2 Hardware monitor “Hardware monitor” can view the information of current voltage and temperature. Figure 3.7.2.1 If “Auto shutdown” has been checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “Auto Shutdown”.
3. 3.7.3 If the high temperature situation doesn’t last for 3 minutes, controller will not do auto shutdown. Hard drive S.M.A.R.T. support S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology) is a diagnostic tool for hard drives to deliver warning of drive failures in advance. S.M.A.R.T. provides users chances to take actions before possible drive failure. S.M.A.R.T.
3.7.4 UPS “UPS” can set up UPS (Uninterruptible Power Supply). Figure 3.7.4.1 Currently, the system only supports and communicates with smart-UPS of APC (American Power Conversion Corp.) UPS. Please review the details from the website: http://www.apc.com/. First, connect the system and APC UPS via RS-232 for communication. Then set up the shutdown values when power is failed. UPS in other companies can work well, but they have no such communication feature. UPS Type Select UPS Type.
“UPS shutdown in progress” “Batteries failed. Please change them NOW!” Battery Level Current percentage of battery level. (%) 3.
Figure 3.8.2.1 Figure 3.8.2.2 When upgrading, there is a progress bar running. After finished upgrading, the system must reboot manually to make the new firmware took effect. Tips Please contact with www.thecus.com for latest firmware. 3.8.3 Reset to factory default “Reset to factory default” allows user to reset controller to factory default setting. Figure 3.8.3.1 Reset to default value, the password is: admin, and IP address to default Static IP. Default IP address: 192.168.1.
3.8.4 Import and export “Import and export” allows user to save system configuration values: export, and apply all configuration: import. For the volume configuration setting, the values are available in export and not available in import which can avoid confliction/date-deleting between two controllers. That says if one controller already exists valuable data in the disks and user may forget to overwrite it. Use import could return to original configuration.
Figure 3.8.5.1 The event log is displayed in reverse order which means the latest event log is on the first page. The event logs are actually saved in the first four hard drives; each hard drive has one copy of event log. For one controller, there are four copies of event logs to make sure users can check event log any time when there is/are failed disk(s). Tips Please plug-in any of the first four hard drives, then event logs can be saved and displayed in next system boot up.
Chapter 4 Advanced operation 4.1 Rebuild If one physical disk of the RG which is set as protected RAID level (e.g.: RAID 3, RAID 5, or RAID 6) is FAILED or has been unplugged/removed, then the status of RG is changed to degraded mode, the system will search/detect spare disk to rebuild the degraded RG to a complete one. It will detect dedicated spare disk as rebuild disk first, then global spare disk. i8500 support Auto-Rebuild. The following is the scenario: Take RAID 6 for example: 1.
Tips “Set dedicated spare” is not available if there is no RG or only RG of RAID 0, JBOD, because user can not set dedicated spare disk to RAID 0 & JBOD. Sometimes, rebuild is called recover; they are the same meaning. The following table is the relationship between RAID levels and rebuild. RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging.
arrays. JBOD The abbreviation of “Just a Bunch Of Disks”. No data protection. RG fails if any hard drive failures or unplugs. 4.2 RG migration To migrate the RAID level, please follow below procedures. 1. 2. 3. Select “/ Volume configuration / RAID group”. Mouse moves to the gray button next to the RG number; click “Migrate”. Change the RAID level by clicking the down arrow to “RAID 5”.
Figure 4.2.2 (Figure 4.2.2: A RAID 0 with 4 physical disks migrates to RAID 5 with 5 physical disks.) Figure 4.2.3 (Figure 4.2.3: A RAID 0 migrates to RAID 5, the complete percentage is 14%.) To do migration, the total size of RG must be larger or equal to the original RG. It does not allow expanding the same RAID level with the same hard disks of original RG. The operation is not allowed when RG is being migrated. System would reject following operations: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
4.3 VD Extension To extend VD size, please follow the procedures. 1. 2. 3. Select “/ Volume configuration / Virtual disk”. Mouse moves to the gray button next to the VD number; click “Extend”. Change the size. The size must be larger than the original, and then click “ “ to start extension. Figure 4.3.1 4. Extension starts. If VD needs initialization, it will display an “Initiating” in “Status” and complete percentage of initialization in “R%”. Figure 4.3.2 (Figure 4.3.
capture. The certain location, named as “Snap VD”, is essentially a new VD.which can be attached to a LUN provisioned to a host as a disk like other ordinary VDs in the system. Rollback restores the data back to the state of any time which was previously captured in case for any unfortunate reason it might be (e.g. virus attack, data corruption, human errors and so on). Snap VD is allocated within the same RG in which the snapshot is taken, we suggest to reserve 20% of RG size or more for snapshot space.
Figure 4.4.1.1 (Figure 4.4.1.1: This is Snap VD, but it is not exported.) 7. 8. 9. Mouse moves to the gray button next to the Snapshot VD number; click “Export”. Enter a capacity for snapshot VD. If size is zero, the exported snapshot VD will be read only. Otherwise, the exported snapshot VD can be read/written, and the size will be the maximum capacity to read/write. Attach a LUN for snapshot VD. Please refer to the previous chapter for attaching a LUN. Done. It can be used as a disk. Figure 4.4.1.
2. 3. 4. z For performance and future rollback, system saves snapshot with names in sequences. For example, three snapshots has been taken and named “SnapVD-01”(first), “SnapVD-02” and “SnapVD-03”(last). When deleting “SnapVD-02”, both of “SnapVD-02” and “SnapVD-03” will be deleted because “SnapVD-03” is related to “SnapVD-02”. For resource management, maximum number of snapshots in VD is 32.
3. Done. It will take snapshots automatically. Figure 4.4.2.1 (Figure 4.4.2.1: It will take snapshots every month, and keep the last 32 snapshot copies.) Tips Daily snapshot will be taken at every 00:00. Weekly snapshot will be taken every Sunday 00:00. Monthly snapshot will be taken every first day of month 00:00. 4.4.3 Rollback The data in snapshot VD can rollback to original VD. Please follow the procedures. 1. 2. 3. Select “/ Volume configuration / Snapshot”.
2. 3. 4. When making rollback, the original VD cannot be accessed for a while. At the same time, the system connects to original VD and snaps VD, and then starts rollback. During rollback, data from snap VD to original VD, the original VD can be accessed and the data in VD just like it has finished rollback. At the same time, the other related snap VD(s) can not be accessed. After rollback, the other snapshot VD(s) after the VD which is doing rollback will be deleted.
use multiple physical paths to create logical "paths" between the server and the storage device. In the case which one or more of these components fails, causing the path to fail, multi-path logic uses an alternate path for I/O. So applications can still access their data. Microsoft iSCSI initiator supports multi-path. Please follow the procedures to use MPIO feature. 1. 2. 3. 4. 5. 6. 7. A host with dual LAN ports connects cables to controller. Create a RG/VD and attach this VD to the host.
Appendix A. Certification list • RAM i8500 RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address. Vendor ATP ATP ATP ATP Unigen Unigen Unigen Unigen Unigen Unigen Unigen Unigen AG64L72T8SQC4S, 512MB DDR-400 (ECC) with Samsung AG28L64T8SHC4S, 1GB DDR-400 with Samsung AG28L72T8SHC4S, 1GB DDR-400 (ECC) with Samsung AB28L72Q8SHC4S, 1GB DDR-400 (ECC, Reg.
3. Mac iSCSI initiator iscsi-initiator-utils-4.0.3.0-4 in kernel 2.6.9 For Red Hat Enterprise Linux 5 (Kernel 2.6), use the build-in iSCSI initiator iscsi-initiator-utils-6.2.0.742-0.5.el5 in kernel 2.6.18 ATTO Xtend SAN iSCSI initiator v3.10 System Requirements: 1. Mac OS X v10.5 or later For ATTO Xtend SAN iSCSI initiator, it is not free. Please contact your local distributor.
Hitachi Hitachi Hitachi Maxtor Maxtor Samsung Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Westem Digital Westem Digital Westem Digital Westem Digital Westem Digital Westem Digital Westem Digital Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Deskstar T7K500, HDT725032VLA360, 320GB, 7200RPM, SATA II, 16M Deskstar P7K500, HDP725050GLA360, 500GB, 7200RPM, SATA II, 16M DiamondMax Plus 9, 6Y080M0, 80GB, 7200RPM, SATA, 8M DiamondMax 11, 6H500F0, 500GB, 7200RPM, SAT
INFO • SCSI info EMS events Level Type INFO ERROR INFO ERROR WARNING INFO ERROR INFO ERROR WARNING Power installed Power absent Power work Power warning Power detect Fan work Fan warning Fan installed Fan not present Thermal warning ERROR ERROR Thermal critical Thermal critical shutdown Thermal ignore value Voltage warning WARNING WARNING INFO WARNING ERROR ERROR Voltage critical Voltage critical shutdown UPS info UPS error UPS error UPS error WARNING SMART T.E.C.
INFO INFO INFO INFO INFO INFO INFO RG created RG creation failed RG deleted VD created VD creation failed VD deleted VD renamed INFO Read-only caching enabled Writeback caching enabled Write-through caching enabled VD extended VD initialization started VD initialization finished VD initialization failed VD rebuild started VD rebuild finished VD rebuild failed VD migration started VD migration finished VD migration failed VD scrubbing started VD scrubbing finished RG migration started RG migration finishe
INFO INFO WARNING WARNING WARNING WARNING INFO INFO INFO INFO • write error occurred Dedicated spare configured Global spare configured PD read error occurred PD write error occurred Parity wrong when scrubbing Data recovered when scrubbing PD freed RG imported RG restored VD restored Snapshot events Level INFO INFO INFO INFO INFO INFO WARNING • Type Snapshot deleted Snapshot auto deleted Snapshot taken Snapshot space configured Snapshot rollback started Snapshot rollback finished Snapshot quota reached
INFO INFO INFO WARNING INFO • backuped data finishes. Battery backup module is detected. Battery backup module is good. Battery backup module is charging. Battery backup module is failed. Battery backup feature is - . JBOD events Level Type INFO Disk inserted Warning Disk removed ERROR INFO WARNING WARNING HDD failure JBOD inserted JBOD removed SMART T.E.
C. Known issues 1. Microsoft MPIO driver is not supported on Windows XP and Windows 2000 Professional. Workaround solution: Using Windows Server 2008/2003, Windows 2000 server to run MPIO. Workaround solution: It’s a JBOD limitation.
D. Microsoft iSCSI Initiator Here is the step by step to setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. The following setup may not use the latest Microsoft iSCSI initiator. 1. 2. 3. Run Microsoft iSCSI Initiator. Click “Discovery”. Click “Add”. Input IP address or DNS name of iSCSI storage device. Figure D.2 4. 5. Click “OK”. Click “Targets”. Figure D.3 6. Click “Log On”. Check “Enable multi-path” if running MPIO.
Figure D.4 7. 8. 9. Click “Advance…” if CHAP information is needed. Click “OK”. The status would be “Connected”. Done, it can connect to an iSCSI disk. The following procedure is to log off iSCSI device. 1. 2. 3. 4. Click “Details” in “Targets”. Check the Identifier, which will be deleted. Click “Log off”. Done, the iSCSI device log off successfully. Figure D.
E. Installation steps for large volume (TB) Introduction: i8500 capable of supporting large volumes (>2TB). When connecting controllers to 64bit OS installed host/server, the host/server is inherently capable for large volumes from the 64bit address. On the other side, if the host/server is installed with 32bit OS, user has to change the block size to 1KB, 2KB or 4KB to support volumes up to 4TB, 8TB or 16TB, for the 32bit host/server is not LBA (Logical Block Addressing) 64bit supported.
1. Follow the installation guild provided by HBA vendor, install HBA driver properly. For iSCSI models, please install the latest Microsoft iSCSI initiator from the link below. http://www.microsoft.com/downloads/details.aspx?FamilyID=12cb3c1a15d6-4585-b385-befd1319f825&DisplayLang=en Step 3: Initialize/Format/Mount the disk 1. Go to Start Æ Control Panel Æ Computer Management Æ Disk Management, it displays a new disk. Figure E.2 2. Initialize the disk. Figure E.3 3.
http://www.microsoft.com/whdc/device/storage/GPT_FAQ.mspx Figure E.4 4. Format the disk. Figure E.5 5. Done. Figure E.6 6. The new disk is ready to use, the available size = 2.72TB.
Figure E.7 Caution If user setups 512B block size for VD and the host/server OS is 32bit, in the last step of formatting disk, user will find OS cannot format the disk sector after 2048GB (2TB). 7. Wrong setting result: OS can not format disk sector after 2048GB(2TB). Figure E.8 F. MPIO and MC/S setup instructions Here is the instruction to setup MPIO or MC/S. The following network diagrams are the examples. Please follow them to setup the environment.
Figure F.1 The MPIO setup instructions are in the following: 1. 2. 3. 4. 5. 6. Create RG/VD, and then attach LUN. Add the first “Target Portal” on Microsoft iSCSI initiator. Add the second “Target Portal” on Microsoft iSCSI initiator. Logon. Enable “Enable multi-path” checkbox. Then click “Advanced…”. Select the first “Source IP” and “Target Portal” to iSCSI data port 1. Then click “OK”. 7. Logon again. 8. Enable “Enable multi-path” checkbox. Then click “Advanced…”. 9.
11. 12. 13. 14. Click “Device” tab, then click “Advanced”. Click “MPIO” tab, select “Load Balance Policy” to “Round Robin”. Click “Apply”. Run “Device Manage” in Windows. Make sure MPIO device is available. 15. Done. The MC/S setup instructions are in the following: 1. 2. Create RG/VD, and then attach LUN. Add the first “Target Portal” on Microsoft iSCSI initiator, For MC/S, there is only ONE “Target Portals” in the “Discovery” tab. 3. Logon. 4. Then click “Advanced…”. 5.
z z INFO: Abnormal shutdown detected, start flushing battery-backed data (xxx KB). INFO: Abnormal shutdown detected, flushing battery-backed data finished BBM inspect steps 1. Connect BBM cable into i8500 controller. 2. Initial controller, then BBM will start to charge automatically. 3. Wait and watch the value of “Battery Backup Module”, please reference the attached screen shot from console, Once the value is over 70%, the BBM can backup 1GB DDR-II cach over 72hr.
■ H M/B Diagram ■ - 86 -